Enforcing Configurable Trust in Client-side Software Stacks by Splitting Information Flow
نویسندگان
چکیده
Current client-server applications such as online banking employ the same client-side software stack to handle information with differing security and functionality requirements, thereby increasing the size and complexity of software that needs to be trusted. While the high complexity of existing software is a significant hindrance to testing and analysis, existing software and interfaces are too widely used to be entirely abandoned. We present a proxy-based approach called FlowGuard to address the problem of large and complex client-side software stacks. FlowGuard’s proxy employs mappings from sensitiveness of information to trustworthiness of software stacks to demultiplex incoming messages amongst multiple client-side software stacks. One of these stacks is a fully-functional legacy software stack and another is a small and simple stack designed to handle sensitive information. In contrast to previous approaches, FlowGuard not only reduces the complexity of software handling sensitive information but also minimizes modifications to legacy software stacks. By allowing users and service providers to define the mappings, FlowGuard also provides flexibility in determining functionality-security tradeoffs. We demonstrate the feasibility of our approach by implementing a FlowGuard, called BLAC, for https-based applications. BLAC relies on text patterns to identify sensitive information in HTTP responses and redirects such responses to a small and simple TrustedViewer, with an unmodified legacy software stack handling the rest of the responses. We developed a prototype implementation that works with a prominent bank’s online banking site. Our evaluation shows that BLAC reduces size and complexity of software that needs to be trusted by an order of magnitude, with a manageable overhead of few tens of milliseconds per HTTP response.
منابع مشابه
Enforcing secure information flow in client-side Web applications. (Vers l'établissement du flux d'information sûr dans les applications Web côté client)
During the last decade, Web applications have evolved from static pages presented by Web servers which centralised all computations to multi-tier applications in which computations are shared between the client and the server. In addition to this, current client-side Web applications often combine code dynamically loaded from different origins to create new functionalities. As it happens, this ...
متن کاملFission: Secure Dynamic Code-Splitting for JavaScript
Traditional web programming involves the creation of two distinct programs: a client-side frontend, a server-side back-end, and a lot of communications boilerplate. An alternative approach is to use a tierless programming model, where a single program describes the behavior of both the client and the server, and the runtime system takes care of communication. Unfortunately, this usually entails...
متن کاملJSON and its use in Semantic Web
The semantic web has evolved over the current web and aims to provide a web that allows for easy retrieval and accessing of information by both man and machine. It provides for a wide variety of technology stacks , language standards and software components which help both man and machine to access data easily. Intelligent information retrieval and the credibility of data is managed in semantic...
متن کاملA Client-Side Business Model for Electronic Privacy
Strengthening the user perception of privacy and trust on the Internet will require userfocused technological approaches, enforceable privacy laws, and business interventions. We propose a novel user-focused business model for privacy with a supporting client-side e-privacy architecture. The e-privacy business model is detailed in terms of target markets and stakeholders, value or revenue model...
متن کاملUsage Control: A Vision for Next Generation Access Control
Protection Objectives Sensitive information protection IPR protection Privacy protection Protection Architectures Server-side reference monitor Client-side reference monitor SRM & CRM Server-side Reference Monitor (SRM) Client-side Reference Monitor (CRM) Traditional Access Control Trust Management Usage Control Sensitive Information Protection Intellectual Property Rights Protection Privacy Pr...
متن کامل